Local Structural Features Threaten Privacy across Social Networks
نویسندگان
چکیده
Can only a handful of structural features and no knowledge of link-level connectivity threaten privacy of individuals in a social network? Specifically, can we use a small number of local structural features defined on nodes (such as degree, clustering coefficient, average degree of neighbors, average clustering coefficient of neighbors, etc) to reduce the uncertainty of individuals’ identities? Our work shows that the answer is yes. We detail how without direct access to the adjacency matrix, we can use the information in an auxiliary graph to effectively and efficiently reduce the uncertainty of any individual’s identity. To our knowledge, our work is the first of its kind that uses only structural features in order to reduce the uncertainty of an individual’s identity to the best possible set of candidates. In addition to being efficient (i.e., sub-quadratic computation), our approach automatically selects the appropriate size of the best possible set of candidates. Previous works assume the adjacency matrix of the anonymized graph is released; and hence rely on the sparsity of the human behavior exhibited in the adjacency matrix. The node × feature matrix is not sparse, making the re-identification problem a lot harder. Our experiments involve multiple synthetic and real graphs plus different noise models and parameter settings. On average for 84.5% of the individuals in real graphs, we are able to reduce the uncertainty by 85.4%. In synthetic graphs, on average for 82% of the nodes, we are able to reduce the uncertainty by 60%. We compare our approach to three baseline methods; and explain our results in terms of Jaccard Similarity and the number of Lookalikes between the original and auxiliary graphs.
منابع مشابه
Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملBenchmarking the Privacy-Preserving People Search
People search is an important topic in information retrieval. Many previous studies on this topic employed social networks to boost search performance by incorporating either local network features (e.g. the common connections between the querying user and candidates in social networks), or global network features (e.g. the PageRank), or both. However, the available social network information c...
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملApplications to Improve Privacy on Online Social Networks
Privacy management is different across the many online social networks and not always satisfies the user expectations. Some social networks members may demand choosing their privacy preferences more richly and exercise a tighter control on the information they drop. For this regard, it is under question if some of the Digital Rights Management systems features may be incorporated to the privacy...
متن کامل